1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
2 years ago
14

What is a man-in-the-middle attack​

Computers and Technology
2 answers:
VMariaS [17]2 years ago
4 0

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

Klio2033 [76]2 years ago
3 0

Answer:

a  warrior

Explanation:

You might be interested in
What does a production proposal provide ?
aliina [53]

Answer:

information about the cast and crew

Explanation:

3 0
3 years ago
Read 2 more answers
What is the benefit to displaying the merge codes in a document? There is no advantage to showing these codes. The recipient of
IgorC [24]

Answer:

The author will know where data will be inserted in the document.

Explanation:

A method of taking data from a database,  spreadsheet, or other form of structured  data, and inserting it into documents such  as letters, envelopes and/or mailing labels.

5 0
3 years ago
Read 2 more answers
Why it's important for designers to consider the environmental impact of a<br> product they design.
Aloiza [94]

Answer:

Kindly check explanation

Explanation:

The environment is our abode which aids the continued survival and growth of plant, animals and humans. The most important components and natural resources which are neceaaaarybto dwell and survive are all waht a makes up an enviromment. The energy derived from the sun aids power generation, plant growthbduring photosynthetic activities which is rewired to produce crops and feed us. The air we breathe are all a part of our enviromment. Therefore, such environment which provides a canvas or platform for our existence must be greatly cared for and no technological innovation, project or design must be allowed to impact negatively on the enviromment. Thus the need for impact assessment of systems in other to ensure that our abode isn't threatened.

4 0
3 years ago
Microwave transmits information between network nodes using
tekilochka [14]

Answer:

Towers and satellite.

Explanation:

Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver.

Generally, the most commonly used electromagnetic wave technology in telecommunications is radio waves.

Radio waves can be defined as an electromagnetic wave that has its frequency ranging from 30 GHz to 300 GHz and its wavelength between 1mm and 3000m. Therefore, radio waves are a series of repetitive valleys and peaks that are typically characterized of having the longest wavelength in the electromagnetic spectrum.

Basically, as a result of radio waves having long wavelengths, they are mainly used in long-distance communications such as the carriage and transmission of data.

The distance from one peak to the next peak is called wavelength. This distance is also equal to the distance from one trough of a wave to another.

Also, microwave is a form of radio waves which typically has short wavelengths and frequency ranging from 300 MHz and 300 GHz.

Hence, microwave transmits information between network nodes using towers and satellite.

7 0
3 years ago
Read 2 more answers
What are storage devices? write two such devices​
Ira Lisetskai [31]

Answer:

two types of storage devices used with computers a primary storage device such as r a m and the secondary storage device such as a hard drive secondary storage can be removable internet or external

Explanation:

hope it is helpful for you please make me brilliant only if you like this answers

8 0
2 years ago
Read 2 more answers
Other questions:
  • Billy used to take care of his laptop. However, one day he lost his laptop. He lost all his data, and there was no way to retrie
    10·2 answers
  • What are two statements that are true about using an external hard drive for backing up data
    14·1 answer
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • Which vendor did IBM select to create the operating system for the IBM PC?
    6·1 answer
  • An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
    12·1 answer
  • A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
    12·2 answers
  • A technique for identifying and tracking assets using technologies such as RFID and smart cards is known as electronic tagging.
    6·1 answer
  • Czy FALL GUYS będzie działało szybko na i5 GH8? Na ilu FPS?
    13·1 answer
  • Date
    6·1 answer
  • Explain set associative mapping<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!